General

  • Target

    57d928a5a5d7170e8645f27bcb57f3c6f26ea937cb57a930ce291ed8a3b65953

  • Size

    10.9MB

  • Sample

    240620-cyvl8steqe

  • MD5

    f82c196dd344898078ddf662370c343f

  • SHA1

    3d16c0b5913ea39641d3e35716a7898b4495e1f2

  • SHA256

    57d928a5a5d7170e8645f27bcb57f3c6f26ea937cb57a930ce291ed8a3b65953

  • SHA512

    2477b4742d8dd332e8e3ef868788fa7e8d6b81b26b72434cc485ec386b7e932e6b6dea89fe5c89b7dab8aa847809cb0281302f21463d25c17260560aa229b538

  • SSDEEP

    24576:kGq4MROxnFE33O3BrrcI0AilFEvxHPXoop:kuMiuMBrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

158.46.224.152:5552

Mutex

0910294482b74b1d8edb1d40e5ed1df5

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %programdata%\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    sysb

  • taskscheduler_taskname

    sysb

  • watchdog_path

    Temp\taskhostw.exe

Targets

    • Target

      57d928a5a5d7170e8645f27bcb57f3c6f26ea937cb57a930ce291ed8a3b65953

    • Size

      10.9MB

    • MD5

      f82c196dd344898078ddf662370c343f

    • SHA1

      3d16c0b5913ea39641d3e35716a7898b4495e1f2

    • SHA256

      57d928a5a5d7170e8645f27bcb57f3c6f26ea937cb57a930ce291ed8a3b65953

    • SHA512

      2477b4742d8dd332e8e3ef868788fa7e8d6b81b26b72434cc485ec386b7e932e6b6dea89fe5c89b7dab8aa847809cb0281302f21463d25c17260560aa229b538

    • SSDEEP

      24576:kGq4MROxnFE33O3BrrcI0AilFEvxHPXoop:kuMiuMBrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks